| ||A29DPWP (2013). Article 29 Data Protection Working Party, Opinion 03/2013 on Purpose Limitation.
| ||Almunia, J. (2012). Speech (Nov. 26, 2012) “Competition and Personal Data Protection”.
| ||BCG (Boston Consulting Group) (2012). The Value of Our Digital Identity. USA: Liberty Global, Inc.
| ||Bouc, A., Han, S.-H., & Pennington, N. (2016). “Why Are They Commenting on His Page?”: Using Facebook Profile Pages to Continue Connections with the Deceased. Computers in Human Behavior, 62, 635-643. |
| ||Byrne, N. (1998). Licensing Technology (2nd ed.). Bristol: Jordan Pub.|
| ||CFREU (2000). Charter of Fundamental Rights of the European Union. 18.12.2000 Of-ficial Journal of the European Communities C 364/1.
| ||Chander, A. (2017). The Racist Algorithm? Michigan Law Review, 115, 1023-1045.
| ||Chirita, A. D. (2018). The Rise of Big Data and the Loss of Privacy. In Bakhoum, Gallego Conde, Mackenordt & Surblyte (Eds.), Personal Data in Competition, Consumer Protection and IP Law—Towards a Holistic Approach? Berlin: Springer.
| ||Cohen, J. (2000). Examined Lives: Informational Privacy and the Subject as Object. 52 Stan. L. Rev., 1373-1438.
| ||Commission Regulation (EC) No 772/2004. Commission Regulation (EC) No 772/2004 of 27 April 2004 on the Application of Article 81(3) of the Treaty to Categories of Technology Transfer Agreements.|
| ||Commission Regulation (EEC) No 4087/88. Commission Regulation (EEC) No 4087/88 of 30 November 1988 on the Application of Article 85 (3) of the Treaty to Categories of Franchise Agreements.|
| ||Crawford, K., & Schultz, J. (2014). Big Data and Due Process: Toward a Framework to Redress Predictive Privacy Harms. Boston College Law Review, 55, 93-128.
| ||Curtis, S. (2015). How Much Is Your Personal Data Worth? The Average Consumer Values Their Personal Data at ￡3,241, According to New Research. Telegraph.
| ||Directive (EU) 2016/943. Directive (EU) 2016/943 of the European Parliament and of the Council of 8 June 2016 on the Protection of Undisclosed Know-How and Business Information (Trade Secrets) against Their Unlawful Acquisition, Use and Dis-closure.|
| ||EDPS (2014). Preliminary Opinion of the European Data Protection Supervisor, Privacy and Competitiveness in the Age of Big Data: The Interplay between Data Protection, Competition Law and Consumer Protection in the Digital Economy.|
| ||EDPS (2015). European Data Protection Supervisor, Opinion 7/2015, Meeting the Challenges of Big Data—A Call for Transparency, User Control, Data Protection by Design and Accountability.|
| ||Franzoni, L. A., & Kaushik, A. K. (2016). The Optimal Scope of Trade Secrets Law. In-ternational Review of Law and Economics, 45, 45-53.
| ||GDPR (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation).|
| ||Hildebrandt, M. (2007). Profiling into the Future: An Assessment of Profiling Tech-nologies in the Context of Ambient Intelligence.
| ||Hon, W. K., Millard, C., & Walden, I. (2012). Who Is Responsible for “Personal Data” in Cloud Computing? The Cloud of Unknowing, Part 2. International Data Privacy Law, 2, 3-18. |
| ||Hoofnagle, C. J. (2003). Big Brother’s Little Helpers: How Choice Point and Other Commercial Data Brokers Collect and Package Your Data for Law Enforcement. North Carolina Journal of International Law and Commercial Regulation, 29, 595-638.
| ||Laudon, J. C. (1996). Markets and Privacy. Communications of the ACM, 39, 92-104.
| ||Lemley, M. A. (2008). The Surprising Virtues of Treating Trade Secrets as IP Rights. Stanford Law Review, 61, 311-354.
| ||Lemley, M. A. (2015). IP in a World without Scarcity. New York University Law Review, 90, 460-515.
| ||Malgieri, G. (2017). Quasi-Property in Consumer Information: Trade Secrets and Con-sumer Rights in the Age of Big Personal Data. In M. Bottis, & E. Alexandropoulou (Eds.), Proceedings of the 7th International Conference on Information Law and Ethics, ICIL 2016, Broadening the Horizons of Information Law and Ethics. A Time for Inclusion (pp. 376-400). Thessaloniki: University of Macedonia Press.
| ||Malgieri, G., & Custers, B. (2017). Pricing Privacy—The Right to Know the Value of Your Personal Data. Computer Law & Security Review: The International Journal of Technology Law and Practice, 34, 289-303.
| ||Mann, S. (2000). Computer Architectures for Protection of Personal Informatic Prop-erty: Putting Pirates, Pigs, and Rapists in Perspective. First Monday, 5.
| ||McDaniel, T. B. (1986). Shop Rights, Rights in Copyrights, Supersession of Prior Agreements, Modification of Agreement, Right of Assignment and Other Contracts. AIPLA Quarterly Journal, 35, 45-47.
| ||Michaels, J. D. (2008). All the President’s Spies: Private-Public Intelligence Partnerships in the War on Terror. California Law Review, 96, 901-966.
| ||O’Donoghue, C. (2017). UK: Spanish DPA Fines Facebook €1.2 Million for Data Protec-tion Infringements.
| ||O’Neil, C. (2016). Weapons of Math Destruction, How Big Data Increases Inequality and Threatens Democracy. New York, NY: Broadway Books.|
| ||OECD (2013). Exploring the Economics of Personal Data: A Survey of Methodologies for Measuring Monetary Value. OECD Digital Economy Papers, No. 220, Paris: OECD Publishing.
| ||Overton, M. (1996). The Agricultural Revolution Reconsidered. In Agricultural Revolu-tion in England: The Transformation of the Agrarian Economy 1500-1850 (pp. 193-207). Cambridge Studies in Historical Geography, Cambridge, MA: Cambridge University Press. |
| ||Pasquale, F. (2015). The Black Box Society, the Secret Algorithms that Control Money and Information. Cambridge, MA: Harvard University Press.
| ||Prince, C. (2018). Do Consumers Want to Control Their Personal Data? Empirical Evi-dence. International Journal of Human-Computer Studies, 110, 21-32.
| ||Prins, C. (2006). Property and Privacy: European Perspectives and the Commodification of Our Identity. In L. Guibault, & B. Hugenholtz (Eds.), The Future of the Public Domain, Identifying the Commons in Information Law (pp. 223-258). Alphen aan den Rijn: Kluwer Law International.|
| ||Prins, J. E. J. (2004). The Propertization of Personal Data and Identities. Electronic Journal of Comparative Law, 8, 1-7. |
| ||Proposal of the European Commission (2015). Proposal of the European Commission for a Directive of the European Parliament and of the Council on Certain Aspects Concerning Contracts for the Supply of Digital Content.|
| ||Report of the European Parliament (2017). Report of the European Parliament on the Proposal for a Directive of the European Parliament and of the Council on Certain Aspects Concerning Contracts for the Supply of Digital Content.
| ||Rotman, D. (2013). How Technology Is Destroying Jobs.
| ||Samuelson, P. (2000). Privacy as Intellectual Property? Stanford Law Review, 52, 1125-1173. |
| ||State v. Loomis (2016). 881 N.W.2d 749 (Wis. 2016).
| ||Steel, E., Locke, C., Cadman, E., & Freese, B. (2013). How Much Is Your Personal Data Worth? Use Our Calculator to Check How Much Multibillion-Dollar Data Broker In-dustry Might Pay for Your Personal Data. Financial Times.
| ||Steppe, R. (2017). Online Price Discrimination and Personal Data: A General Data Pro-tection Regulation Perspective. Computer Law & Security Review, 33, 768-785.
| ||Turow, J., & McGuigan, L. (2014). Retailing and Social Discrimination: The New Normal? In S. P. Gangadharan (Ed.), Data and Discrimination: Collected Essays (pp. 27-29). Open Technology Institute.